General
-
Target
ee5cb738f933fea4e1b0ec877e3f31de_JaffaCakes118
-
Size
827KB
-
Sample
240920-y6rq7swejc
-
MD5
ee5cb738f933fea4e1b0ec877e3f31de
-
SHA1
98f292fb73747590884949409d0dc7cd233ab2c2
-
SHA256
bccc9e3d756a755324883a0587184066522a027831dc451f0ccdc9a4162c95a2
-
SHA512
3eb19401cd7336d08073f00cba29000fc683e2c6a08161dfa484137f3ab051224d63d4f1313a96326d4630619734992ec090ce8454c5d02193d0198d4e813f3f
-
SSDEEP
12288:abyF6l3CgdOyrhbBSvpNX6VkbWLYLPnAHizOS8RgV1ZEmKMOhqfJo1mJxRHHE6mx:abxfb276z3CSSJSM8qfJYOW
Static task
static1
Behavioral task
behavioral1
Sample
ee5cb738f933fea4e1b0ec877e3f31de_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee5cb738f933fea4e1b0ec877e3f31de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1634002210:AAGipukUEr-bNBgl2R1_hwFgfb9ez_v6wzE/sendMessage?chat_id=1401219117
Targets
-
-
Target
ee5cb738f933fea4e1b0ec877e3f31de_JaffaCakes118
-
Size
827KB
-
MD5
ee5cb738f933fea4e1b0ec877e3f31de
-
SHA1
98f292fb73747590884949409d0dc7cd233ab2c2
-
SHA256
bccc9e3d756a755324883a0587184066522a027831dc451f0ccdc9a4162c95a2
-
SHA512
3eb19401cd7336d08073f00cba29000fc683e2c6a08161dfa484137f3ab051224d63d4f1313a96326d4630619734992ec090ce8454c5d02193d0198d4e813f3f
-
SSDEEP
12288:abyF6l3CgdOyrhbBSvpNX6VkbWLYLPnAHizOS8RgV1ZEmKMOhqfJo1mJxRHHE6mx:abxfb276z3CSSJSM8qfJYOW
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-